Contact Us
LAN (Local Area Networking)
WLAN (Wireless Local Area Networking)
SURVEILLANCE (CCTV or IP Camera)
SECURITY
Web Development
      Authorised Partner  

Registered Office :

5 Lindsay Street
Kol-87




There are some very basic yet important factors one should keep in mind while planning for Security, viz.
Do you have any IT security policy?
How do you handle your sensitive documents?
Are your IT resources physically secured?
Do you have any Disaster Recovery planning?
Do you have any Antivirus?
Are you aware of commonly found internet threats?
Do you have any firewall or UTM?
Do you allow remote access of your IT resources?
POLICY: Has management provided the necessary leadership and reduced liability by issuing comprehensive information security policies, operating procedures, and associated responsibility statements?
EMPLOYEE ACKNOWLEDGEMENT: Are all employees and contractors required to provide written acknowledgement of their understanding and acceptance of the organization's information security policies?
CONFIDENTIALITY AGREEMENTS: Has the execution of properly signed confidentiality agreements been verified before proprietary and/or sensitive information is disclosed, in any form, to individuals outside the organization?
PHYSICAL SECURITY: Are buildings, paper records, and sensitive IT resources (e.g., computer and network equipment, storage media, wiring closets) within them properly secured from unauthorized access, tampering, damage, and/or theft by an intruder with malicious intent?
BUSINESS RESUMPTION PLAN: Does the organization have a documented and frequently tested business resumption plan for critical computer system and associated office support infrastructure that includes frequent system backups, off-site data backup storage, emergency notification, replacement IT and office resources, alternate facilities, and detailed recovery procedures?
ANTI-VIRUS: Are all computer systems protected with up-to-date anti-virus software and other defences against malicious software attacks?
INTERNET SECURITY: Are all dedicated connections to the Internet and other external networks properly documented, authorized, and protected by firewalls, intrusion detection systems, virtual private networks (or other forms of encrypted communication,) and incident response capability?
REMOTE ACCESS: Are modem and wireless access point connections known, authorized, and properly secured?
PASSWORDS: Have all vendor-supplied, default passwords, or similar "published" access codes for all installed operating systems, database management systems, network devices, application packages, and any other commercially produced IT products been changed or disabled?
SOFTWARE PATCHES: Are security-sensitive software patches, including the removal of unnecessary sample application software, promptly applied to systems that are accessible to users outside of the organization?
DATA PROTECTION: Is sensitive, valuable information properly protected from unauthorized access, including Windows network file shares and undocumented (desktop) Web and FTP servers?
AUDITS AND VULNERABILITY TESTING: Are all computers and network devices (e.g., routers, and switches) within your organization regularly tested for exploitable vulnerabilities and any unauthorized (or illegally copied!) software?
If you are ready with the aforesaid information then just mail us at enquiry@techit.co.in with your preferred Brand for the quote or call us to help you out to plan your design.

 
© Copyright 2008-2009 techIT All Rights Reserved. Concept :tech IT